TY - BOOK AU - Forouzan,Behrouz A. TI - Computer networks: a top-down approach SN - 9781259001567 U1 - 004.6 PY - 2012/// CY - New York, NY PB - McGraw-Hill KW - Computer networks KW - Internet N1 - Machine generated contents note: ch. 1 Introduction -- 1.1. Overview of the Internet -- 1.1.1. Networks -- 1.1.2. Switching -- 1.1.3. Internet -- 1.1.4. Accessing the Internet -- 1.1.5. Hardware and Software -- 1.2. Protocol Layering -- 1.2.1. Scenarios -- 1.2.2. TCP/IP Protocol Suite -- 1.2.3. OSI Model -- 1.3. Internet History -- 1.3.1. Early History -- 1.3.2. Birth of the Internet -- 1.3.3. Internet Today -- 1.4. Standards and Administration -- 1.4.1. Internet Standards -- 1.4.2. Internet Administration -- 1.5. End-Chapter Materials -- 1.5.1. Further Reading -- 1.5.2. Key Terms -- 1.5.3. Summary -- 1.6. Practice Set -- 1.6.1. Quizzes -- 1.6.2. Questions -- 1.6.3. Problems -- 1.7. Simulation Experiments -- 1.7.1. Applets -- 1.7.2. Lab Assignments -- ch. 2 Application Layer -- 2.1. Introduction -- 2.1.1. Providing Services -- 2.1.2. Application-Layer Paradigms -- 2.2. Client-Server Paradigm -- 2.2.1. Application Programming Interface -- 2.2.2. Using Services of the Transport Layer -- 2.3. Standard Client-Server Applications -- 2.3.1. World Wide Web and HTTP -- 2.3.2. FTP -- 2.3.3. Electronic Mail -- 2.3.4. Telnet -- 2.3.5. Secure Shell (SSH) -- 2.3.6. Domain Name System (DNS) -- 2.4. Peer-to-Peer Paradigm -- 2.4.1. P2P Networks -- 2.4.2. Distributed Hash Table (DHT) -- 2.4.3. Chord -- 2.4.4. Pastry -- 2.4.5. Kademlia -- 2.4.6. Popular P2P Network: BitTorrent -- 2.5. Socket Interface Programming -- 2.5.1. Socket Interface in C -- 2.6. End-Chapter Materials -- 2.6.1. Further Reading -- 2.6.2. Key Terms -- 2.6.3. Summary -- 2.7. Practice Set -- 2.7.1. Quizzes -- 2.7.2. Questions -- 2.7.3. Problems -- 2.8. Simulation Experiments -- 2.8.1. Applets -- 2.8.2. Lab Assignments -- 2.9. Programming Assignment -- ch. 3 Transport Layer -- 3.1. Introduction -- 3.1.1. Transport-Layer Services -- 3.2. Transport-Layer Protocols -- 3.2.1. Simple Protocol -- 3.2.2. Stop-and-Wait Protocol -- 3.2.3. Go-Back-N Protocol (GBN) -- 3.2.4. Selective-Repeat Protocol -- 3.2.5. Bidirectional Protocols: Piggybacking -- 3.2.6. Internet Transport-Layer Protocols -- 3.3. User Datagram Protocol (UDP) -- 3.3.1. User Datagram -- 3.3.2. UDP Services -- 3.3.3. UDP Applications -- 3.4. Transmission Control Protocol (TCP) -- 3.4.1. TCP Services -- 3.4.2. TCP Features -- 3.4.3. Segment -- 3.4.4. TCP Connection -- 3.4.5. State Transition Diagram -- 3.4.6. Windows in TCP -- 3.4.7. Flow Control -- 3.4.8. Error Control -- 3.4.9. TCP Congestion Control -- 3.4.10. TCP Timers -- 3.4.11. Options -- 3.5. End-Chapter Materials -- 3.5.1. Further Reading -- 3.5.2. Key Terms -- 3.5.3. Summary -- 3.6. Practice Set -- 3.6.1. Quizzes -- 3.6.2. Questions -- 3.6.3. Problems -- 3.7. Simulation Experiments -- 3.7.1. Applets -- 3.7.2. Lab Assignments -- 3.8. Programming Assignment -- ch. 4 Network Layer -- 4.1. Introduction -- 4.1.1. Network-Layer Services -- 4.1.2. Packet Switching -- 4.1.3. Network-Layer Performance -- 4.1.4. Network-Layer Congestion -- 4.1.5. Structure of A Router -- 4.2. Network-Layer Protocols -- 4.2.1. IPv4 Datagram Format -- 4.2.2. IPv4 Addresses -- 4.2.3. Forwarding of IP Packets -- 4.2.4. ICMPv4 -- 4.3. Unicast Routing -- 4.3.1. General Idea -- 4.3.2. Routing Algorithms -- 4.3.3. Unicast Routing Protocols -- 4.4. Multicast Routing -- 4.4.1. Introduction -- 4.4.2. Multicasting Basics -- 4.4.3. Intradomain Routing Protocols -- 4.4.4. Interdomain Routing Protocols -- 4.5. Next Generation IP -- 4.5.1. Packet Format -- 4.5.2. IPv6 Addressing -- 4.5.3. Transition from IPv4 to IPv6 -- 4.5.4. ICMPv6 -- 4.6. End-Chapter Materials -- 4.6.1. Further Reading -- 4.6.2. Key Terms -- 4.6.3. Summary -- 4.7. Practice Set -- 4.7.1. Quizzes -- 4.7.2. Questions -- 4.7.3. Problems -- 4.8. Simulation Experiments -- 4.8.1. Applets -- 4.8.2. Lab Assignments -- 4.9. Programming Assignment -- ch. 5 Data-Link Layer: Wired Networks -- 5.1. Introduction -- 5.1.1. Nodes and Links -- 5.1.2. Two Types of Links -- 5.1.3. Two Sublayers -- 5.2. Data Link Control (DLC) -- 5.2.1. Framing -- 5.2.2. Flow and Error Control -- 5.2.3. Error Detection and Correction -- 5.2.4. Two DLC Protocols -- 5.3. Multiple Access Protocols -- 5.3.1. Random Access -- 5.3.2. Controlled Access -- 5.3.3. Channelization -- 5.4. Link-Layer Addressing -- 5.5. Wired Lans: Ethernet Protocol -- 5.5.1. IEEE Project 802 -- 5.5.2. Standard Ethernet -- 5.5.3. Fast Ethernet (100 Mbps) -- 5.5.4. Gigabit Ethernet -- 5.5.5. 10-Gigabit Ethernet -- 5.5.6. Virtual LANs -- 5.6. Other Wired Networks -- 5.6.1. Point-to-Point Networks -- 5.6.2. Sonet -- 5.6.3. Switched Network: ATM -- 5.7. Connecting Devices -- 5.7.1. Repeaters or Hubs -- 5.7.2. Link-Layer Switches -- 5.7.3. Routers -- 5.8. End-Chapter Materials -- 5.8.1. Recommended Reading -- 5.8.2. Key Terms -- 5.8.3. Summary -- 5.9. Practice Set -- 5.9.1. Quizzes -- 5.9.2. Questions -- 5.9.3. Problems -- 5.10. Simulation Experiments -- 5.10.1. Applets -- 5.10.2. Lab Assignments -- 5.11. Programming Assignments -- ch. 6 Wireless Networks and Mobile IP -- 6.1. Wireless LANs -- 6.1.1. Introduction -- 6.1.2. IEEE 802.11 Project -- 6.1.3. Bluetooth -- 6.1.4. WiMAX -- 6.2. Other Wireless Networks -- 6.2.1. Channelization -- 6.2.2. Cellular Telephony -- 6.2.3. Satellite Networks -- 6.3. Mobile IP -- 6.3.1. Addressing -- 6.3.2. Agents -- 6.3.3. Three Phases -- 6.3.4. Inefficiency in Mobile IP -- 6.4. End-Chapter Materials -- 6.4.1. Further Reading -- 6.4.2. Key Terms -- 6.4.3. Summary -- 6.5. Practice Set -- 6.5.1. Quizzes -- 6.5.2. Questions -- 6.5.3. Problems -- 6.6. Simulation Experiments -- 6.6.1. Applets -- 6.6.2. Lab Assignments -- 6.7. Programming Assignment -- ch. 7 Physical Layer and Transmission Media -- 7.1. Data and Signals -- 7.1.1. Analog and Digital -- 7.1.2. Transmission Impairment -- 7.1.3. Data Rate Limits -- 7.1.4. Performance -- 7.2. Digital Transmission -- 7.2.1. Digital-to-Digital Conversion -- 7.2.2. Analog-to-Digital Conversion -- 7.3. Analog Transmission -- 7.3.1. Digital-to-Analog Conversion -- 7.3.2. Analog-to-Analog Conversion -- 7.4. Bandwidth Utilization -- 7.4.1. Multiplexing -- 7.4.2. Spread Spectrum -- 7.5. Transmission Media -- 7.5.1. Guided Media -- 7.5.2. Unguided Media: Wireless -- 7.6. End-Chapter Materials -- 7.6.1. Recommended Reading -- 7.6.2. Key Terms -- 7.6.3. Summary -- 7.7. Practice Set -- 7.7.1. Quizzes -- 7.7.2. Questions -- 7.7.3. Problems -- ch. 8 Multimedia and Quality of Service -- 8.1. Compression -- 8.1.1. Lossless Compression -- 8.1.2. Lossy Compression -- 8.2. Multimedia Data -- 8.2.1. Text -- 8.2.2. Image -- 8.2.3. Video -- 8.2.4. Audio -- 8.3. Multimedia in the Internet -- 8.3.1. Streaming Stored Audio/Video -- 8.3.2. Streaming Live Audio/Video -- 8.3.3. Real-Time Interactive Audio/Video -- 8.4. Real-Time Interactive Protocols -- 8.4.1. Rationale for New Protocols -- 8.4.2. RTP -- 8.4.3. RTCP -- 8.4.4. Session Initialization Protocol (SIP) -- 8.4.5. H.323 -- 8.4.6. SCTP -- 8.5. Quality of Service -- 8.5.1. Data-Flow Characteristics -- 8.5.2. Flow Classes -- 8.5.3. Flow Control to Improve QoS -- 8.5.4. Integrated Services (IntServ) -- 8.5.5. Differentiated Services (DiffServ) -- 8.6. End-Chapter Materials -- 8.6.1. Recommended Reading -- 8.6.2. Key Terms -- 8.6.3. Summary -- 8.7. Practice Set -- 8.7.1. Quizzes -- 8.7.2. Questions -- 8.7.3. Problems -- 8.8. Simulation Experiments -- 8.8.1. Applets -- 8.8.2. Lab Assignments -- 8.9. Programming Assignments -- ch. 9 Network Management -- 9.1. Introduction -- 9.1.1. Configuration Management -- 9.1.2. Fault Management -- 9.1.3. Performance Management -- 9.1.4. Security Management -- 9.1.5. Accounting Management -- 9.2. SNMP -- 9.2.1. Managers and Agents -- 9.2.2. Management Components -- 9.2.3. Overview -- 9.2.4. SMI -- 9.2.5. MIB -- 9.2.6. SNMP -- 9.3. ASN. I -- 9.3.1. Language Basics -- 9.3.2. Data Types -- 9.3.3. Encoding -- 9.4. End-Chapter Materials -- 9.4.1. Further Reading -- 9.4.2. Key Terms -- 9.4.3. Summary -- 9.5. Practice Set -- 9.5.1. Quizzes -- 9.5.2. Questions -- 9.5.3. Problems -- ch. 10 Network Security -- 10.1. Introduction -- 10.1.1. Security Goals -- 10.1.2. Attacks -- 10.1.3. Services and Techniques -- 10.2. Confidentiality -- 10.2.1. Symmetric-Key Ciphers -- 10.2.2. Asymmetric-Key Ciphers -- 10.3. Other Aspects of Security -- 10.3.1. Message Integrity -- 10.3.2. Message Authentication -- 10.3.3. Digital Signature -- 10.3.4. Entity Authentication -- 10.3.5. Key Management -- 10.4. Internet Security -- 10.4.1. Application-Layer Security -- 10.4.2. Transport-Layer Security -- 10.4.3. Network-Layer Security -- 10.5. Firewalls -- 10.5.1. Packet-Filter Firewall -- 10.5.2. Proxy Firewall -- 10.6. End-Chapter Materials -- 10.6.1. Further Reading -- 10.6.2. Key Terms -- 10.6.3. Summary -- 10.7. Practice Set -- 10.7.1. Quizzes -- 10.7.2. Questions -- 10.7.3. Problems -- 10.8. Simulation Experiments -- 10.8.1. Applets -- 10.8.2. Lab Assignments -- 10.9. Programming Assignments -- ch. 11 Socket Programming In Java -- 11.1. Introduction. Note continued: 11.1.1. Addresses and Ports -- 11.1.2. Client-Server Paradigm -- 11.2. Programming with UDP -- 11.2.1. Iterative Approach -- 11.2.2. Concurrent Approach -- 11.3. Programming with TCP -- 11.3.1. Iterative Approach -- 11.3.2. Concurrent Approach -- 11.4. End-Chapter Materials -- 11.4.1. Further Reading -- 11.4.2. Key Terms -- 11.4.3. Summary -- 11.5. Practice Set -- 11.5.1. Quizzes -- 11.5.2. Questions -- 11.5.3. Problems -- 11.6. Programming Assignments ER -